Skip to main content
Top
Published in: Real-Time Systems 4/2020

29-08-2020

A schedule randomization policy to mitigate timing attacks in WirelessHART networks

Authors: Ankita Samaddar, Arvind Easwaran, Rui Tan

Published in: Real-Time Systems | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Industrial control systems consist of large-scale wireless sensor-actuator networks (WSAN) that control the physical plant. The communications between the sensors and the actuators need to be reliable and guaranteed within strict deadlines for safe operation of all the system components in industrial setups. WirelessHART is the most suitable and widely adopted WSAN standard that serves as the medium of communication in industries. To satisfy deadlines of real-time flows in WirelessHART networks, the centralized network manager decides the communication schedule during network initialization. The same schedule repeats every hyperperiod. The repetitive nature of the communication slots over every hyperperiod makes the system vulnerable to timing attacks which can eventually disrupt the safety of the system. To mitigate such attacks, we propose SlotSwapper, a moving target defense mechanism that randomizes the communication slots over a hyperperiod schedule without violating the feasibility constraints of real-time flows in WirelessHART networks. We show that SlotSwapper is optimal for single-channel WirelessHART network with real-time harmonic flows. We extensively evaluated our algorithm with \(\varvec{4800}\) flow sets over \(\varvec{100}\) Tmote sky motes in Cooja simulator. We use Prediction Probability of slots of a schedule to measure the security provided by SlotSwapper. We use Kullback–Leibler divergence to measure the divergence of our solution w.r.t. a truly random solution.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Alur R, D’Innocenzo A, Johansson KH , Pappas GJ, Weiss G (2009) Modeling and analysis of multi-hop control networks. In: Real-Time and Embedded Technology and Applications Symposium, 2009. RTAS 2009. 15th IEEE, pp 223–232. IEEE Alur R, D’Innocenzo A, Johansson KH , Pappas GJ, Weiss G (2009) Modeling and analysis of multi-hop control networks. In: Real-Time and Embedded Technology and Applications Symposium, 2009. RTAS 2009. 15th IEEE, pp 223–232. IEEE
go back to reference Appavoo P, William EK, Chan MC, Mohammad M (2018) Indriya2: A heterogeneous wireless sensor network (wsn) testbed. In: International Conference on Testbeds and Research Infrastructures, pp 3–19. Springer Appavoo P, William EK, Chan MC, Mohammad M (2018) Indriya2: A heterogeneous wireless sensor network (wsn) testbed. In: International Conference on Testbeds and Research Infrastructures, pp 3–19. Springer
go back to reference Brummet R, Gunatilaka D, Vyas D, Chipara O, Lu C (2018) A flexible retransmission policy for industrial wireless sensor actuator networks. In 2018 IEEE International Conference on Industrial Internet (ICII), pp 79–88. IEEE Brummet R, Gunatilaka D, Vyas D, Chipara O, Lu C (2018) A flexible retransmission policy for industrial wireless sensor actuator networks. In 2018 IEEE International Conference on Industrial Internet (ICII), pp 79–88. IEEE
go back to reference Cheng X, Shi J, Sha M(2019) Cracking the channel hopping sequences in ieee 802.15.4e-based industrial tsch networks. In Proceedings of the International Conference on Internet of Things Design and Implementation, IoTDI ”19, pp 130–141, New York, NY, USA, 2019. Association for Computing Machinery. ISBN 9781450362832. https://doi.org/10.1145/3302505.3310075 Cheng X, Shi J, Sha M(2019) Cracking the channel hopping sequences in ieee 802.15.4e-based industrial tsch networks. In Proceedings of the International Conference on Internet of Things Design and Implementation, IoTDI ”19, pp 130–141, New York, NY, USA, 2019. Association for Computing Machinery. ISBN 9781450362832. https://​doi.​org/​10.​1145/​3302505.​3310075
go back to reference Chen D, Nixon M, Mok A (2010) WirelessHART: Real-Time Mesh Network for Industrial Automation, 1st edn. Springer Publishing Company, Incorporated. ISBN 1441960465, 9781441960467 Chen D, Nixon M, Mok A (2010) WirelessHART: Real-Time Mesh Network for Industrial Automation, 1st edn. Springer Publishing Company, Incorporated. ISBN 1441960465, 9781441960467
go back to reference Chenyang L, Saifullah A, Li B, Sha M, Gonzalez H, Gunatilaka D, Chengjie W, Nie L, Chen Y (2016) Real-time wireless sensor-actuator networks for industrial cyber-physical systems. Proceedings of the IEEE 104(5):1013–1024CrossRef Chenyang L, Saifullah A, Li B, Sha M, Gonzalez H, Gunatilaka D, Chengjie W, Nie L, Chen Y (2016) Real-time wireless sensor-actuator networks for industrial cyber-physical systems. Proceedings of the IEEE 104(5):1013–1024CrossRef
go back to reference Daidone R, Dini G, Tiloca M (2014) Wirel Netw. A solution to the gts-based selective jamming attack on ieee 802.15. 4 networks. 20(5):1223–1235 Daidone R, Dini G, Tiloca M (2014) Wirel Netw. A solution to the gts-based selective jamming attack on ieee 802.15. 4 networks. 20(5):1223–1235
go back to reference Dang K, Shen J-Z, Dong L-D, Xia Y-X (2013) A graph route-based superframe scheduling scheme in wirelesshart mesh networks for high robustness. Wireless Pers Commun 71(4):2431–2444CrossRef Dang K, Shen J-Z, Dong L-D, Xia Y-X (2013) A graph route-based superframe scheduling scheme in wirelesshart mesh networks for high robustness. Wireless Pers Commun 71(4):2431–2444CrossRef
go back to reference Deng J, Han R, Mishra S (2005) Countermeasures against traffic analysis attacks in wireless sensor networks. SecureComm 5:113–124 Deng J, Han R, Mishra S (2005) Countermeasures against traffic analysis attacks in wireless sensor networks. SecureComm 5:113–124
go back to reference Fiore G, Ercoli V, Isaksson AJ, Landernäs K, Di Benedetto MD (2009) Multihop multi-channel scheduling for wireless control in wirelesshart networks. In: Emerging Technologies & Factory Automation, 2009. ETFA 2009. IEEE Conference on, pp 1–8. IEEE, Fiore G, Ercoli V, Isaksson AJ, Landernäs K, Di Benedetto MD (2009) Multihop multi-channel scheduling for wireless control in wirelesshart networks. In: Emerging Technologies & Factory Automation, 2009. ETFA 2009. IEEE Conference on, pp 1–8. IEEE,
go back to reference Galas DJ, Dewey G, Kunert-Graf J, Sakhanenko NA (2017) Expansion of the kullback-leibler divergence, and a new class of information metrics. Axioms 6(2):8CrossRef Galas DJ, Dewey G, Kunert-Graf J, Sakhanenko NA (2017) Expansion of the kullback-leibler divergence, and a new class of information metrics. Axioms 6(2):8CrossRef
go back to reference Grover K, Lim A, Yang Q (2014) Jamming and anti-jamming techniques in wireless networks: a survey. Int J of Ad Hoc Ubiquitous Comput 17(4):197–215CrossRef Grover K, Lim A, Yang Q (2014) Jamming and anti-jamming techniques in wireless networks: a survey. Int J of Ad Hoc Ubiquitous Comput 17(4):197–215CrossRef
go back to reference Han S, Zhu X, Mok Aloysius K, Chen D, Nixon M 2011) Reliable and real-time communication in industrial wireless mesh networks. In:Real-Time and Embedded Technology and Applications Symposium (RTAS), 2011 17th IEEE, pp 3–12. IEEE Han S, Zhu X, Mok Aloysius K, Chen D, Nixon M 2011) Reliable and real-time communication in industrial wireless mesh networks. In:Real-Time and Embedded Technology and Applications Symposium (RTAS), 2011 17th IEEE, pp 3–12. IEEE
go back to reference Jardak C (2012) The storage and data processing in wireless sensor networks Jardak C (2012) The storage and data processing in wireless sensor networks
go back to reference Jiang K, Eles P, Peng Z, Chattopadhyay S, Batina L (2016) Sparta: A scheduling policy for thwarting differential power analysis attacks. In: Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific, pp 667–672. IEEE Jiang K, Eles P, Peng Z, Chattopadhyay S, Batina L (2016) Sparta: A scheduling policy for thwarting differential power analysis attacks. In: Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific, pp 667–672. IEEE
go back to reference Kim Anna N, Hekland F, Petersen S, Doyle P (2008) When hart goes wireless: Understanding and implementing the wirelesshart standard. In 2008 IEEE International Conference on Emerging Technologies and Factory Automation, pp 899–907. IEEE Kim Anna N, Hekland F, Petersen S, Doyle P (2008) When hart goes wireless: Understanding and implementing the wirelesshart standard. In 2008 IEEE International Conference on Emerging Technologies and Factory Automation, pp 899–907. IEEE
go back to reference Krüger K, Volp M, Fohler G (2018) Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems. LIPIcs-Leibniz Int Proc Inform 106:22 Krüger K, Volp M, Fohler G (2018) Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems. LIPIcs-Leibniz Int Proc Inform 106:22
go back to reference Lajara R, Pelegrí-Sebastiá J, Solano JJ (2010) Power consumption analysis of operating systems for wireless sensor networks. Sensors 10(6):5809–5826CrossRef Lajara R, Pelegrí-Sebastiá J, Solano JJ (2010) Power consumption analysis of operating systems for wireless sensor networks. Sensors 10(6):5809–5826CrossRef
go back to reference Langner R (2011) Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy 9(3):49–51CrossRef Langner R (2011) Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy 9(3):49–51CrossRef
go back to reference Li X-Y, Moaveni-Nejad K, Song W-Z, Wang W-Z (2005) Interference-aware topology control for wireless sensor networks. In 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005., pp 263–274. IEEE Li X-Y, Moaveni-Nejad K, Song W-Z, Wang W-Z (2005) Interference-aware topology control for wireless sensor networks. In 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005., pp 263–274. IEEE
go back to reference Lou X, Cuong TX, Tan R, Yau David KY, Kalbarczyk Zbigniew T(2019) Assessing and mitigating impact of time delay attack: a case study for power grid frequency control. In: Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, pages 207–216 Lou X, Cuong TX, Tan R, Yau David KY, Kalbarczyk Zbigniew T(2019) Assessing and mitigating impact of time delay attack: a case study for power grid frequency control. In: Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, pages 207–216
go back to reference Modekurthy VP, Saifullah A, Madria S (2019) Distributedhart: A distributed real-time scheduling system for wirelesshart networks. In: 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp 216–227. IEEE Modekurthy VP, Saifullah A, Madria S (2019) Distributedhart: A distributed real-time scheduling system for wirelesshart networks. In: 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp 216–227. IEEE
go back to reference Mpitziopoulos A, Gavalas D, Konstantopoulos C, Pantziou G (2009) A survey on jamming attacks and countermeasures in wsns. IEEE Commun Surv Tutor 11(4):42–56CrossRef Mpitziopoulos A, Gavalas D, Konstantopoulos C, Pantziou G (2009) A survey on jamming attacks and countermeasures in wsns. IEEE Commun Surv Tutor 11(4):42–56CrossRef
go back to reference Nasri M, Chantem T, Bloom G, Gerdes Ryan M (2019) On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks. In: 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp 103–116. IEEE Nasri M, Chantem T, Bloom G, Gerdes Ryan M (2019) On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks. In: 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp 103–116. IEEE
go back to reference Osterlind F, Dunkels A, Eriksson J, Finne N, Voigt T (2006) Cross-level sensor network simulation with cooja. In: 2006 31st IEEE conference on Local computer networks, proceedings. IEEE Osterlind F, Dunkels A, Eriksson J, Finne N, Voigt T (2006) Cross-level sensor network simulation with cooja. In: 2006 31st IEEE conference on Local computer networks, proceedings. IEEE
go back to reference Petersen S, Carlsen S (2009) Performance evaluation of wirelesshart for factory automation. In: 2009 IEEE Conference on Emerging Technologies & Factory Automation, pp 1–9. IEEE Petersen S, Carlsen S (2009) Performance evaluation of wirelesshart for factory automation. In: 2009 IEEE Conference on Emerging Technologies & Factory Automation, pp 1–9. IEEE
go back to reference Pickholtz R, Schilling D, Milstein L (1982) Theory of spread-spectrum communications-a tutorial. IEEE Trans Commun 30(5):855–884CrossRef Pickholtz R, Schilling D, Milstein L (1982) Theory of spread-spectrum communications-a tutorial. IEEE Trans Commun 30(5):855–884CrossRef
go back to reference Pongaliur K, Abraham Z, Liu Alex X, Xiao L, Kempel L (2008) Securing sensor nodes against side channel attacks. In: High Assurance Systems Engineering Symposium, 2008. HASE 2008. 11th IEEE. IEEE Pongaliur K, Abraham Z, Liu Alex X, Xiao L, Kempel L (2008) Securing sensor nodes against side channel attacks. In: High Assurance Systems Engineering Symposium, 2008. HASE 2008. 11th IEEE. IEEE
go back to reference Proano A, Lazos L (2012) Packet-hiding methods for preventing selective jamming attacks. IEEE Trans Dependable Secur Comput 9(1):101–114CrossRef Proano A, Lazos L (2012) Packet-hiding methods for preventing selective jamming attacks. IEEE Trans Dependable Secur Comput 9(1):101–114CrossRef
go back to reference Proano A, Lazos L (2010) Selective jamming attacks in wireless networks. In: Communications (ICC), 2010 IEEE International Conference on, pp 1–6. IEEE Proano A, Lazos L (2010) Selective jamming attacks in wireless networks. In: Communications (ICC), 2010 IEEE International Conference on, pp 1–6. IEEE
go back to reference Raiber Fiana Kurland Oren (2017) Kullback-leibler divergence revisited. In: Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval, pp 117–124. ACM Raiber Fiana Kurland Oren (2017) Kullback-leibler divergence revisited. In: Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval, pp 117–124. ACM
go back to reference Remke A, Wu X (2013) Wirelesshart modeling and performance evaluation. In 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp 1–12. IEEE Remke A, Wu X (2013) Wirelesshart modeling and performance evaluation. In 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp 1–12. IEEE
go back to reference Saifullah A, Xu Y, Lu C, Chen Y (2010) Real-time scheduling for wirelesshart networks. In Real-Time Systems Symposium (RTSS), 2010 IEEE 31st, pp 150–159. IEEE Saifullah A, Xu Y, Lu C, Chen Y (2010) Real-time scheduling for wirelesshart networks. In Real-Time Systems Symposium (RTSS), 2010 IEEE 31st, pp 150–159. IEEE
go back to reference Samaddar A, Easwaran A, Tan R (2020) Slotswapper: a schedule randomization protocol for real-time wirelesshart networks. ACM SIGBED Rev 16(4):32–37CrossRef Samaddar A, Easwaran A, Tan R (2020) Slotswapper: a schedule randomization protocol for real-time wirelesshart networks. ACM SIGBED Rev 16(4):32–37CrossRef
go back to reference Song J, Han S, Mok A, Chen D, Lucas M, Nixon M, Wally Pratt. Wirelesshart (2008a) Applying wireless technology in real-time industrial process control. In: IEEE real-time and embedded technology and applications symposium, pp 377–386. IEEE Song J, Han S, Mok A, Chen D, Lucas M, Nixon M, Wally Pratt. Wirelesshart (2008a) Applying wireless technology in real-time industrial process control. In: IEEE real-time and embedded technology and applications symposium, pp 377–386. IEEE
go back to reference Song J, Han S, Zhu X, Mok AK, Chen D, Nixon M (2008b) A complete wirelesshart network. In: Proceedings of the 6th ACM conference on Embedded network sensor systems. ACM Song J, Han S, Zhu X, Mok AK, Chen D, Nixon M (2008b) A complete wirelesshart network. In: Proceedings of the 6th ACM conference on Embedded network sensor systems. ACM
go back to reference Tiloca M, De Guglielmo D, Dini G, Anastasi G, Das SK (2017) Jammy: a distributed and dynamic solution to selective jamming attack in tdma wsns. IEEE Trans Dependable Secur Comput 14(4):392–405CrossRef Tiloca M, De Guglielmo D, Dini G, Anastasi G, Das SK (2017) Jammy: a distributed and dynamic solution to selective jamming attack in tdma wsns. IEEE Trans Dependable Secur Comput 14(4):392–405CrossRef
go back to reference Tiloca M, Guglielmo DD, Dini G, Anastasi G, Das SK (2018) Distributed shuffling against selective jamming attack in ieee 802.15. 4e tsch networks. ACM Trans Sens Netw TOSN 15(1):1–28 Tiloca M, Guglielmo DD, Dini G, Anastasi G, Das SK (2018) Distributed shuffling against selective jamming attack in ieee 802.15. 4e tsch networks. ACM Trans Sens Netw TOSN 15(1):1–28
go back to reference Wood Anthony D, Stankovic John A, Zhou G (2007) Deejam: Defeating energy-efficient jamming in ieee 802.15. 4-based wireless networks. In Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECON’07. In: IEEE Conference on 4th Annual IEEE Communications Society Wood Anthony D, Stankovic John A, Zhou G (2007) Deejam: Defeating energy-efficient jamming in ieee 802.15. 4-based wireless networks. In Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECON’07. In: IEEE Conference on 4th Annual IEEE Communications Society
go back to reference Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. ACM Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. ACM
go back to reference Yoon M-K, Mohan S, Chen C-Y, Taskshuffler LS (2016) A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems. In Real-Time and Embedded Technology and Applications Symposium (RTAS), 2016 IEEE, pp 1–12. IEEE Yoon M-K, Mohan S, Chen C-Y, Taskshuffler LS (2016) A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems. In Real-Time and Embedded Technology and Applications Symposium (RTAS), 2016 IEEE, pp 1–12. IEEE
go back to reference Zhang T, Gong T, Han S, Deng Q, Hu XS (2019) Fully distributed packet scheduling framework for handling disturbances in lossy real-time wireless networks. IEEE Trans Mob Comput Zhang T, Gong T, Han S, Deng Q, Hu XS (2019) Fully distributed packet scheduling framework for handling disturbances in lossy real-time wireless networks. IEEE Trans Mob Comput
go back to reference Zhang S, Zhang G, Yan A, Xiang Z, Ma T (2013) A highly reliable link scheduling strategy for wirelesshart networks. In: 2013 International Conference on Advanced Technologies for Communications (ATC), pp 39–43. IEEE Zhang S, Zhang G, Yan A, Xiang Z, Ma T (2013) A highly reliable link scheduling strategy for wirelesshart networks. In: 2013 International Conference on Advanced Technologies for Communications (ATC), pp 39–43. IEEE
Metadata
Title
A schedule randomization policy to mitigate timing attacks in WirelessHART networks
Authors
Ankita Samaddar
Arvind Easwaran
Rui Tan
Publication date
29-08-2020
Publisher
Springer US
Published in
Real-Time Systems / Issue 4/2020
Print ISSN: 0922-6443
Electronic ISSN: 1573-1383
DOI
https://doi.org/10.1007/s11241-020-09354-z

Premium Partner